Sciweavers

2472 search results - page 75 / 495
» Parallel Key Exchange
Sort
View
ICDCN
2009
Springer
15 years 7 months ago
An Analytical Model of Information Dissemination for a Gossip-Based Protocol
We develop an analytical model of information dissemination for a gossip protocol. With this model we analyse how fast an item is replicated through a network. We also determine th...
Rena Bakhshi, Daniela Gavidia, Wan Fokkink, Maarte...
121
Voted
SRDS
1991
IEEE
15 years 4 months ago
A Fault-Tolerant, Scalable, Low-Overhead Distributed Garbage Detection Protocol
We present a protocol for the distributed detection of garbage in a distributed system subject to common failures such as lost and duplicated messages, network partition, dismount...
Marc Shapiro
DAGM
2003
Springer
15 years 6 months ago
Image Sequence Analysis in Environmental and Live Sciences
Image sequence processing techniques are essential to study dynamical processes such as exchange, growth, and transport processes. In this survey paper, a generalized framework for...
Bernd Jähne
114
Voted
FC
2001
Springer
94views Cryptology» more  FC 2001»
15 years 5 months ago
Mutual Authentication for Low-Power Mobile Devices
We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical imp...
Markus Jakobsson, David Pointcheval
SERVICES
2008
71views more  SERVICES 2008»
15 years 2 months ago
Identifying Opportunities for Web Services Security Performance Optimizations
WS-Security is an essential component of the Web services protocol stack. WS-Security provides end-to-end security properties, thereby assuring the participation of nonsecure tran...
Robert A. van Engelen, Wei Zhang